CN110830260B - Block chain-based digital signature timestamp generation method - Google Patents
Block chain-based digital signature timestamp generation method Download PDFInfo
- Publication number
- CN110830260B CN110830260B CN201910929365.5A CN201910929365A CN110830260B CN 110830260 B CN110830260 B CN 110830260B CN 201910929365 A CN201910929365 A CN 201910929365A CN 110830260 B CN110830260 B CN 110830260B
- Authority
- CN
- China
- Prior art keywords
- signature
- block chain
- block
- hash value
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The invention discloses a timestamp generation method of a digital signature based on a block chain, which mainly comprises three stages: the method comprises a system parameter establishing stage, a signature stage and a verification stage. In the signing stage, a signer obtains hash values of n newly confirmed blocks in a block chain, binds the n hash values and a message M to be signed together to be recorded as M ', signs the M ' to obtain a signature T, calculates a hash value h of M ' | | T, and uploads the h to the block chain through a transaction Tx. After the verifier finishes the verification of the signature T, the time range before the generation time of the block where the transaction Tx is located after the generation time of the block where the nth hash value is located is taken as the time stamp of the signature T, and the method is an accurate method for de-centralizing the time stamp of the digital signature.
Description
Technical Field
The invention belongs to the data protection technology, and particularly relates to a method for stamping a digital signature.
Background
The time stamp is proof that the digital file is created at a certain time, and is an indispensable tool for protecting the evidence value of the digital information. In 1990, Stuart Haber et al proposed a scheme for timestamping a digital file on CRYPTO 90, which enables the non-forgeability of the timestamp by a trust center signing the hash value and the current time of the digital file. A large number of improvement schemes are provided in follow-up work, but the existing schemes all depend on a trusted third party and cannot solve the problem of single-point failure.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method for realizing the time stamping of the digital signature based on the block chain technology.
The technical scheme adopted by the invention for solving the technical problems is that the timestamp generation method of the digital signature based on the block chain mainly comprises three stages: the method comprises a system parameter establishing stage, a signature stage and a verification stage.
A system parameter establishing stage: generating blocks by a block chain and recording the generation time of each block, wherein the system generates a safe hash function, a signature algorithm and a corresponding verification algorithm;
and (3) signature stage: a signer obtains hash values of n newly confirmed blocks in a block chain, binds the n hash values and a message M to be signed together to be marked as M ', signs the M ' to obtain a signature T, calculates a hash value h of M ' | | T, and uploads the h to the block chain through a transaction Tx;
a verification stage: and after the verification of the signature T is passed, the verifier takes the time range before the generation time of the block where the transaction Tx is located after the generation time of the block where the nth hash value is located as the time stamp of the signature T.
The block chain is a decentralized distributed account, blocks on the chain are connected through hash values, the time sequence of the blocks is guaranteed, and each block of the block chain comprises the generation time of the block.
The method has the advantages that the problem of single point failure is solved based on the block chain technology, and the method is a decentralized accurate method for stamping the time stamp for the digital signature.
Detailed Description
The Blockchain is a public block chain, and as for a digital signature generated by any user in the system, any other user in the system can verify the digital signature through the Blockchain and generate an accurate and consistent timestamp. The following description will take the signer a and the verifier B as an example.
Firstly, a system parameter establishing stage:
if n blocks are linked after a block in Blockchain, it can be confirmed that the block is on Blockchain. The system generates a safe Hash function H (), a signature algorithm SigA(.) and corresponding verification algorithm VerA(.), subscript a indicates signer a. T ═ SigAAnd (M) indicates that the signer A signs the message M to obtain a signature T. VerAAnd (M, T) represents that the verifier verifies the validity of the signature T of the signer A on the message M, if the signature T is valid, true is returned, and if the signature T is invalid, false is returned. And | represents a connection symbol. The signature algorithm Sig may be any signature algorithm.
II, signature stage:
when the signer A needs to sign the message M, the following operations are executed:
1. obtaining hash values h of n blocks which are newly confirmed on the current Blockchain1,h2,...,hn(arranged by block height from low to high); preferably, n is more than or equal to 12 in the Ether house, and n is more than or equal to 6 in the bitcoin;
2. the way to bind these n hash values with the message M to be signed is: calculating a hash value hBlock=H(h1||h2||...||hn) Then M hBlockIs marked as M';
3. signing M' with T ═ SigA(M||hBlock) Obtaining a signature T;
4. calculating a hash value hA=H(M||h1||h2||...||hn||T);
5. Generating a pen containing hAAnd sending the transaction to Blockchain, and ensuring that Blockchain records the transaction (transaction Tx is recorded at position L in Blockchain);
6. the signer A records the position L of the transaction on Blockchain, and sends a message M and a hash value h1,h2,...,hnThe signature T and the location L are sent to the verifier B.
Thirdly, a verification stage:
the verifier B receives the message M and the hash value h1,h2,...,hnAfter signing T and location L, the signature needs to be verified and the timestamp of the digital signature confirmed. Verifier B performs the following operations:
1. verifying a hash value h1,h2,...,hnWhether the hash value is the hash value of n continuous blocks on Blockchain, and if not, exiting; if yes, continuing to execute the next step;
2. finding the transaction of the signer A in Blockchain by using the position information L, and acquiring a hash value hAVerifier B verifies equation hA=H(M||h1||h2||...||hnIf | T) holds. If the equality is not satisfied, exiting; if the equation is established, continuing to execute the next step;
3. calculating a hash value hBlock=H(h1||h2||...||hn);
4. Executing a validation Algorithm VerA((M||hBlock) T), if false is returned, the signature is invalid and quit; if true is returned, the signature is valid, and the verifierB, acquiring the generation time t of the block where the transaction Tx is located, and recording that the hash value on Blockchain is hnThe block of (1) is generated for time t'; verifier B confirms that signature T was generated before T and after T ', the time interval T', T]As a timestamp of the digital signature T.
Claims (3)
1. A timestamp generation method based on digital signature of a block chain is characterized by comprising the following steps:
1) a system parameter establishing stage:
generating blocks by a block chain and recording the generation time of each block, wherein the system generates a secure hash function H (), a signature algorithm Sig (), and a corresponding verification algorithm Ver ();
2) and (3) signature stage:
2-1) signer obtains hash values h of recently generated n continuous blocks in a block chain1,h2,...,hnThen calculate the hash value hBlock=H(h1||h2||...||hn) Using signature algorithm to pair message M and hash value hBlockSignature processing is performed to obtain a signature T ═ Sig (M | | h)Block) Then, the hash value H is calculated as H (M | | H)1||h2||...||hnI T), and finally generating a block chain transaction Tx containing the hash value h and sending the block chain transaction Tx to the block chain;
2-2) the blockchain records a transaction Tx, wherein the transaction Tx is recorded at a position L in the blockchain;
2-3) the signer records the position L in the block chain where the transaction Tx is located, and sends the message M and the hash value h1,h2,...,hnThe signature T and the position L are sent to a verifier;
3) in the verification stage, a verifier receives the message M and the hash value h1,h2,..,hnAfter signing T and location L, the signature is verified and a timestamp of the digital signature is generated:
3-1) verifier verifies hash value h1,h2,...,hnWhether the hash value is the hash value of n continuous blocks on the block chain, and if not, exiting; if yes, continuing to execute the next step;
3-2) finding the signer's transaction Tx in the blockchain according to the location L and obtaining the hash value H, the verifier verifying the equation H ═ H (M | | H)1||h2||...||hnIf the equation is not established, quitting; if the equation is established, continuing to execute the next step;
3-3) calculating the Hash value hBlock=H(h1||h2||...||hn) Then, the verification algorithm Ver ((M | | h) of the signature is executedBlock) T), if the verification fails, the signature is invalid and quit; if the verification is passed, the signature is valid, and the verifier acquires the generation time t of the block recording the transaction Tx and the hash value h on the block chainnThe generation time T 'of the block of (a), the time stamp of the verifier confirmation signature T is [ T', T [ ]]。
2. The method of claim 1, wherein if the block chain is an Etherhouse block chain, n ≧ 12 is set.
3. The method of claim 1, wherein if the block chain is a bitcoin block chain, n ≧ 6 is set.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910929365.5A CN110830260B (en) | 2019-09-27 | 2019-09-27 | Block chain-based digital signature timestamp generation method |
US17/032,041 US11936799B2 (en) | 2019-09-27 | 2020-09-25 | Blockchain-based time stamping method for digital signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910929365.5A CN110830260B (en) | 2019-09-27 | 2019-09-27 | Block chain-based digital signature timestamp generation method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110830260A CN110830260A (en) | 2020-02-21 |
CN110830260B true CN110830260B (en) | 2021-09-24 |
Family
ID=69548370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910929365.5A Active CN110830260B (en) | 2019-09-27 | 2019-09-27 | Block chain-based digital signature timestamp generation method |
Country Status (2)
Country | Link |
---|---|
US (1) | US11936799B2 (en) |
CN (1) | CN110830260B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3989479B1 (en) * | 2020-10-23 | 2023-07-19 | Nokia Technologies Oy | Methods and devices in a blockchain network |
CN114598494B (en) * | 2022-01-18 | 2023-02-28 | 电子科技大学 | Data timing transmission method based on block chain |
CN114726536A (en) * | 2022-03-31 | 2022-07-08 | 南方电网科学研究院有限责任公司 | Timestamp generation method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108566398A (en) * | 2018-04-23 | 2018-09-21 | 北京奇虎科技有限公司 | Block chain attack cognitive method based on timestamp and device |
CN109034805A (en) * | 2018-08-09 | 2018-12-18 | 江苏先安科技有限公司 | It is a kind of to stab signature verification method suitable for the new time of block chain and built-in field |
CN109508984A (en) * | 2018-11-26 | 2019-03-22 | 中国科学院软件研究所 | It is a kind of that card method is deposited based on certainty common recognition and the block chain electronics of trusted timestamp |
CN110061843A (en) * | 2019-01-31 | 2019-07-26 | 阿里巴巴集团控股有限公司 | The high creation method of block, device and equipment in a kind of chain type account book |
US20190278921A1 (en) * | 2013-07-06 | 2019-09-12 | NewVoiceMedia Ltd. | System and methods for tamper proof interaction recording and timestamping |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004260664A (en) * | 2003-02-27 | 2004-09-16 | Nec Corp | Xml signature generation system with time stamp imparting function, device, method, and program |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US11212081B2 (en) * | 2017-02-24 | 2021-12-28 | Nec Corporation | Method for signing a new block in a decentralized blockchain consensus network |
CN110430064B (en) * | 2017-03-30 | 2020-12-04 | 腾讯科技(深圳)有限公司 | Block chain system, message processing method and storage medium |
US20180293557A1 (en) * | 2017-04-05 | 2018-10-11 | Samsung Sds Co., Ltd. | Method of charging electronic currency automatically based on blockchain and system thereof |
US11102244B1 (en) * | 2017-06-07 | 2021-08-24 | Agari Data, Inc. | Automated intelligence gathering |
CN111466096B (en) * | 2017-09-08 | 2021-12-31 | 尤利杰公司 | System and method for providing immutable records |
US11728995B2 (en) * | 2018-04-09 | 2023-08-15 | American Express Travel Related Services Company, Inc. | Reward point transfers using blockchain |
US11080691B2 (en) * | 2018-04-09 | 2021-08-03 | Storecoin Inc. | Fork-tolerant consensus protocol |
US20210097532A1 (en) * | 2018-04-19 | 2021-04-01 | Sak Mahasuverachai | Systems and methods for recording assets and transactions thereof in blockchains |
EP3605944B1 (en) * | 2018-07-31 | 2023-08-30 | Siemens Healthcare GmbH | Documenting timestamps within a blockchain |
JP2020021186A (en) * | 2018-07-31 | 2020-02-06 | 富士通株式会社 | Transaction control device, transaction control program, and transaction control method |
US20200117733A1 (en) * | 2018-10-11 | 2020-04-16 | Sap Se | Blockchain integration layer |
US10929816B2 (en) * | 2018-10-29 | 2021-02-23 | Advanced Messaging Technologies, Inc. | Systems and methods for message transmission and retrieval using blockchain |
CN109784005A (en) * | 2018-12-28 | 2019-05-21 | 国网雄安金融科技有限公司 | Electronic protocol manages platform and electronic protocol management method |
-
2019
- 2019-09-27 CN CN201910929365.5A patent/CN110830260B/en active Active
-
2020
- 2020-09-25 US US17/032,041 patent/US11936799B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190278921A1 (en) * | 2013-07-06 | 2019-09-12 | NewVoiceMedia Ltd. | System and methods for tamper proof interaction recording and timestamping |
CN108566398A (en) * | 2018-04-23 | 2018-09-21 | 北京奇虎科技有限公司 | Block chain attack cognitive method based on timestamp and device |
CN109034805A (en) * | 2018-08-09 | 2018-12-18 | 江苏先安科技有限公司 | It is a kind of to stab signature verification method suitable for the new time of block chain and built-in field |
CN109508984A (en) * | 2018-11-26 | 2019-03-22 | 中国科学院软件研究所 | It is a kind of that card method is deposited based on certainty common recognition and the block chain electronics of trusted timestamp |
CN110061843A (en) * | 2019-01-31 | 2019-07-26 | 阿里巴巴集团控股有限公司 | The high creation method of block, device and equipment in a kind of chain type account book |
Non-Patent Citations (1)
Title |
---|
《基于区块链的投票系统的设计与开发》;胡浩;《中国优秀硕士学位论文全文数据库》;20190115;全文 * |
Also Published As
Publication number | Publication date |
---|---|
US20210099315A1 (en) | 2021-04-01 |
US11936799B2 (en) | 2024-03-19 |
CN110830260A (en) | 2020-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110830260B (en) | Block chain-based digital signature timestamp generation method | |
CN108667626B (en) | Secure two-party collaboration SM2 signature method | |
US8971528B2 (en) | Modified elliptic curve signature algorithm for message recovery | |
US8533482B2 (en) | Method for generating a key pair and transmitting a public key or request file of a certificate in security | |
CN109067524B (en) | Public and private key pair generation method and system | |
CN106972931B (en) | Method for transparentizing certificate in PKI | |
EP2951949B1 (en) | Modified sm2 elliptic curve signature algorithm supporting message recovery | |
CN107948143B (en) | Identity-based privacy protection integrity detection method and system in cloud storage | |
US8122245B2 (en) | Anonymity revocation | |
WO2019228557A3 (en) | System and method for decentralized-identifier authentication | |
CN108551392B (en) | Blind signature generation method and system based on SM9 digital signature | |
CN112202558B (en) | Credible digital signature method and device based on block chain | |
CN101931631B (en) | Method for digital signatures capable of establishing reliable correspondence with handwritten signatures | |
CN101127107A (en) | Electronic document automatic signing system and method | |
CN106713336B (en) | Electronic data safeguard system and method based on double, asymmetrical encryption technology | |
CA2317775A1 (en) | Hybrid signature scheme | |
CN107835082B (en) | Traceable ring signature authentication protocol based on identity | |
CN102739626A (en) | Method and device for time synchronization, time stamping device and trusted time server | |
CN104392185A (en) | Method for verifying data integrity during log forensics in cloud environments | |
CN101917273A (en) | ECC certificate-based ADS-B data authentication method | |
CA2669472C (en) | Compressed ecdsa signatures | |
CN112152807A (en) | Two-party collaborative digital signature method based on SM2 algorithm | |
CN111654366A (en) | Secure bidirectional heterogeneous strong-designation verifier signature method between PKI and IBC | |
CN110943845A (en) | Method and medium for cooperatively generating SM9 signature by two light-weight parties | |
CN104917615A (en) | Trusted computing platform attribute verification method based on ring signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |